Business of Information Technology  >   Business Processes  >   Business Communications  >   Email  >  

e-Mail Administration

RSS Feed    Add to Google    Add to My Yahoo!
e-Mail Administration Multimedia (View All Report Types)
 
What a Fraudulent Invoice Email Scam Looks Like
sponsored by Agari
PRODUCT DEMO: Email security is integral to the smooth operation of pretty much any business. In this webcast, learn how to combat targeted attacks, spear-phishing, and disguised malicious emails dressed up to look and sound legitimate.
Posted: 27 Oct 2016 | Premiered: 19 Oct 2016

Agari

Best Practices for Evaluating Your Cloud Messaging Options
sponsored by Mimecast
WEBCAST: In this webinar, learn about email security, archiving, and continuity best practices, and why they are necessary. Additionally, learn about the many cloud messaging options available, and see the pros and cons and key considerations of each.
Posted: 23 Oct 2015 | Premiered: Feb 19, 2015

Mimecast

What a Business Email Compromise Scam Looks Like
sponsored by Agari
PRODUCT DEMO: Gain insight into how to avoid falling prey to these email scams and protect your enterprise's data. Discover not only the intricacies of these attacks, but how to ensure every member of your team is interacting with trusted email sources.
Posted: 27 Oct 2016 | Premiered: 19 Oct 2016

Agari

Dell Server Solutions - PowerEdge Tower Servers
sponsored by Dell, Inc. and IntelĀ®
VIDEO: Tower Servers are ideal first servers for small businesses with the right combination of value, reliability, collaboration and data protection features to improve your business continuity and productivity. Learn more in this video which takes a look at a growing restaurant's adoption of a Dell PowerEdge Tower Server.
Posted: 12 Apr 2011 | Premiered: 12 Apr 2011

Dell, Inc. and IntelĀ®

Lotus Symphony Demo
sponsored by IBM
PRODUCT DEMO: Work smarter with Lotus Sympony document software from IBM.
Posted: 05 Oct 2009 | Premiered: 05 Oct 2009

IBM

InterScan Messaging Hosted Security (IMHS) Trial
sponsored by Trend Micro, Inc.
SOFTWARE DOWNLOAD: Many traditional email security solutions take up too much time and are not as effective as they should be in stopping spam. Hosted email security by Trend Micro provides unlimited email scanning capacity with always-up-to-the-minute security that is continuously tuned and optimized 24x7.
Posted: 21 Aug 2009 | Premiered: 21 Aug 2009

Trend Micro, Inc.

Mail Security for Microsoft Exchange Server
sponsored by Symantec Corporation
PODCAST: This Podcast explores the key features and benefits of Mail Security 5.0 including a new user interface, an enhanced content filtering rules, new user group based rules, and windows cluster support.
Posted: 19 Feb 2007 | Premiered: Feb 1, 2007

Symantec Corporation

Exchange Object Recovery
sponsored by PHD Virtual
WEBCAST: This webcast addresses the need for an email recovery system and goes in-depth into a solution for your organization. Watch now to see how this solution can help recover your entire Exchange platform.
Posted: 10 Feb 2014 | Premiered: Aug 19, 2013

PHD Virtual

Changing Face of Exchange E-mail Management
sponsored by Azaleos Corporation
WEBCAST: Please join us for a webinar featuring a detailed overview of the differences between the 3 primary management strategies for Exchange in the marketplace today: on-premise, hosting and remote managed services.
Posted: 09 Oct 2008 | Premiered: Oct 9, 2008

Azaleos Corporation

Extreme Transaction Processing: Electronic trading at NYMEX
sponsored by Progress
WEBCAST: This Webcast explores a method for increasing the capacity of messaging infrastructure in order to support greater message throughput and future organizational growth.
Posted: 28 Sep 2007 | Premiered: Sep 28, 2007

Progress
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement